منابع مشابه
Complying with the Rules of Asimov
Social systems are calling attention to adequate sets of rules as e.g. to comply with the rules of Asimov as a codex [BF05]. In the context of Multiple Sensor Data Fusion (MSDF) a variety of interacting (logical) sensor agents might autonomously self-organize their part of complex tasks’ organizational solution processes due to co-operations, communications and co-ordinations. Even computationa...
متن کاملAB - compacta Isaac
We define a compactum X to be AB-compact if the cofinality of the character χ(x, Y ) is countable whenever x ∈ Y and Y ⊂ X. It is a natural open question if every AB-compactum is necessarily first countable. We strengthen several results from [Arhangel’skii and Buzyakova, Convergence in compacta and linear Lindelöfness, Comment. Math. Univ. Carolin. 39 (1998), no. 1, 159–166] by proving the fol...
متن کاملDistinguishing attacks on ISAAC
This paper presents two strong distinguishers for the deterministic random bit generator ISAAC, requiring 2 and 2 samples of respectively 64 and 32 bits, based on the observation that more than 2 167 initial states among the 2 192 ones induce a strongly non-uniform distribution of the bits produced at the first round of the algorithm. A previous attack on ISAAC presented at Asiacrypt’06 by Paul...
متن کاملIsaac Keslassy - PhD Thesis
The function of a router is to switch arriving packets to their correct output destination. A router is built to achieve a specified capacity (the sum of the rates of its interfaces), and users expect a router to consistently achieve this capacity. However, no commercial high-speed router can guarantee today that it will achieve its full capacity for all arrival traffic patterns. This is due to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1992
ISSN: 0028-0836,1476-4687
DOI: 10.1038/357113a0